Skip to content

Commit 45e105e

Browse files
committed
automatic module_metadata_base.json update
1 parent 2989c9e commit 45e105e

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

db/modules_metadata_base.json

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187237,6 +187237,65 @@
187237187237
"session_types": false,
187238187238
"needs_cleanup": null
187239187239
},
187240+
"exploit_windows/scada/mypro_cmdexe": {
187241+
"name": "mySCADA MyPRO Authenticated Command Injection (CVE-2023-28384)",
187242+
"fullname": "exploit/windows/scada/mypro_cmdexe",
187243+
"aliases": [
187244+
187245+
],
187246+
"rank": 600,
187247+
"disclosure_date": "2022-09-22",
187248+
"type": "exploit",
187249+
"author": [
187250+
"Michael Heinzl"
187251+
],
187252+
"description": "Authenticated Command Injection in MyPRO <= v8.28.0 from mySCADA.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT AUTHORITY\\SYSTEM.",
187253+
"references": [
187254+
"URL-https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06",
187255+
"CVE-2023-28384"
187256+
],
187257+
"platform": "Windows",
187258+
"arch": "cmd",
187259+
"rport": 80,
187260+
"autofilter_ports": [
187261+
80,
187262+
8080,
187263+
443,
187264+
8000,
187265+
8888,
187266+
8880,
187267+
8008,
187268+
3000,
187269+
8443
187270+
],
187271+
"autofilter_services": [
187272+
"http",
187273+
"https"
187274+
],
187275+
"targets": [
187276+
"Windows_Fetch"
187277+
],
187278+
"mod_time": "2024-07-25 23:54:27 +0000",
187279+
"path": "/modules/exploits/windows/scada/mypro_cmdexe.rb",
187280+
"is_install_path": true,
187281+
"ref_name": "windows/scada/mypro_cmdexe",
187282+
"check": true,
187283+
"post_auth": true,
187284+
"default_credential": false,
187285+
"notes": {
187286+
"Stability": [
187287+
"crash-safe"
187288+
],
187289+
"Reliability": [
187290+
"repeatable-session"
187291+
],
187292+
"SideEffects": [
187293+
"ioc-in-logs"
187294+
]
187295+
},
187296+
"session_types": false,
187297+
"needs_cleanup": null
187298+
},
187240187299
"exploit_windows/scada/procyon_core_server": {
187241187300
"name": "Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow",
187242187301
"fullname": "exploit/windows/scada/procyon_core_server",

0 commit comments

Comments
 (0)